Vulnerability Description
The Filr – Secure document library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via unrestricted file upload in all versions up to, and including, 1.2.11 due to insufficient file type restrictions in the FILR_Uploader class. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload malicious HTML files containing JavaScript that will execute whenever a user accesses the uploaded file, granted they have permission to create or edit posts with the 'filr' post type.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/filr-protection/tags/1.2.10/src/class
- https://plugins.trac.wordpress.org/browser/filr-protection/trunk/src/class-filr-
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old
- https://www.wordfence.com/threat-intel/vulnerabilities/id/c16c3a8d-bae1-4729-86c
FAQ
What is CVE-2025-14632?
CVE-2025-14632 is a vulnerability with a CVSS score of 4.4 (MEDIUM). The Filr – Secure document library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via unrestricted file upload in all versions up to, and including, 1.2.11 due to insufficient file ...
How severe is CVE-2025-14632?
CVE-2025-14632 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-14632?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.